Sciweavers

1769 search results - page 136 / 354
» Cryptography
Sort
View
136
Voted
IPPS
2005
IEEE
15 years 9 months ago
Generic Design Space Exploration for Reconfigurable Architectures
We propose in this paper an original design space exploration method for reconfigurable architectures adapted to fine and coarse grain resources. The exploration flow deals with c...
Lilian Bossuet, Guy Gogniat, Jean Luc Philippe
145
Voted
ITCC
2005
IEEE
15 years 9 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 9 months ago
Badger - A Fast and Provably Secure MAC
We present Badger, a new fast and provably secure MAC based on universal hashing. In the construction, a modified tree hash that is more efficient than standard tree hashing is us...
Martin Boesgaard, Thomas Christensen, Erik Zenner
ACNS
2005
Springer
138views Cryptology» more  ACNS 2005»
15 years 9 months ago
Indexing Information for Data Forensics
We introduce novel techniques for organizing the indexing structures of how data is stored so that alterations from an original version can be detected and the changed values speci...
Michael T. Goodrich, Mikhail J. Atallah, Roberto T...
ASIACRYPT
2005
Springer
15 years 9 months ago
Universally Convertible Directed Signatures
Many variants of Chaum and van Antwerpen’s undeniable signatures have been proposed to achieve specific properties desired in real-world applications of cryptography. Among them...
Fabien Laguillaumie, Pascal Paillier, Damien Vergn...